Search Results - (( using factor method algorithm ) OR ( based evaluation method algorithm ))
Search alternatives:
- evaluation method »
- method algorithm »
- based evaluation »
- using factor »
-
1
Evaluation of lightning current and ground reflection factor using measured electromagnetic field
Published 2014“…In order to validate the proposed method, a set of measured electromagnetic fields are used as the input parameters for the proposed algorithm. …”
Get full text
Get full text
Article -
2
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
3
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
4
Disparity map algorithm for stereo matching process using local based method
Published 2022“…Global method performs a matching process using global energy or a probability function over the whole image. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Optimization of RFID network planning using MDB-FA method
Published 2017“…Monte Carlo simulation (MCS) is used to generate tag distribution based on network topology design modules as a method to evaluate the deterministic indicators in NP-hard problems. …”
Get full text
Get full text
Article -
6
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The Wilcockson Ranked Test was applied to evaluate the differences between these two methods. …”
Get full text
Get full text
Thesis -
8
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
9
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…Thus, evaluating the applicability and performance of the HFPSO algorithm, it is evident that the proposed method provides a better tool to solve OPF problems of electric power networks. …”
Get full text
Get full text
Thesis -
10
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
11
Novel techniques for enhancement and segmentation of acne vulgaris lesions
Published 2013“…The proposed algorithm is compared with two other methods. The proposed enhancement algorithm shows better result than both the other methods based on CIF and ICN. …”
Get full text
Get full text
Get full text
Citation Index Journal -
12
Information Theoretic-based Feature Selection for Machine Learning
Published 2018“…Moreover, the third test used ten natural domain datasets obtained from UCI Repository, in about fifteen different experiments, using three to four different Machine Learning Algorithms for performance evaluation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
On density-based data streams clustering algorithms: A survey
Published 2017“…The main idea in these algorithms is using density-based methods in the clustering process and at the same time overcoming the constraints, which are put out by data stream’s nature. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore proposed algorithm has the advantages to localize EZ using ESL inexpensively and accurately which promotes usage of this valuable technique for epilepsy pre-surgical evaluation.…”
Get full text
Get full text
Thesis -
15
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
16
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
Get full text
Get full text
Thesis -
17
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…Across all experiments, the IAOA-based method demonstrated superior performance compared to AOA and other methods, including a hybrid approach combining the average multi-verse optimizer and sine cosine algorithm, particle swarm optimizer, the sine cosine algorithm, multi-verse optimizer and grey wolf optimizer. …”
Get full text
Get full text
Get full text
Article -
18
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
19
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…A new encryption algorithm is proposed and designed which is followed by a verification algorithm used to access such Internet-of-Things (IoT) based systems. …”
Book Chapter -
20
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…Therefore, this study aimed to used OBIA method with selected machine learning algorithm to estimate the mangrove age by using Sentinel 2A image. …”
Get full text
Get full text
Thesis
